Security BSides Las Vegas 2025

Abhijith "Abx" B R

Abhijith B R, also known by the pseudonym Abx, has over a decade of experience in the offensive cyber security industry. He is a professional hacker, offensive security specialist, red team consultant, researcher, trainer, and public speaker.
He is currently building Breachsimrange.io and working with multiple organizations as a consulting specialist, helping them build offensive security operations, improve their security posture, assess cyber defense systems, and bridge the gap between business leadership and security professionals.

Abhijith previously worked with Envestnet, Nissan Motor Corporation and EY.
As the founder of Adversary Village, Abhijith leads a community initiative focused on adversary simulation, tactics, purple teaming, threat actor and ransomware research-emulation, and offensive cyber security. Adversary Village is part of the DEF CON Villages and hosts hacking villages at major events like DEF CON and RSA Conference.
He also leads the Tactical Adversary project (https://tacticaladversary.io/), a personal initiative focused on offensive cybersecurity, adversary simulation, and red teaming tradecraft.
Abhijith has spoken at conferences including DEF CON, RSA Conference, The Diana Initiative, Opensource India, Security BSides (Las Vegas, SF, Delhi), Hack Space Con, Nullcon, and c0c0n.


Session

08-05
15:00
240min
Threat and adversary emulation operational exercises
Abhijith "Abx" B R

This hands-on workshop provides participants with foundation in practical threat and adversary emulation. Designed for security professionals looking to enhance their offensive and defensive capabilities, the training takes place in a controlled, enterprise-grade lab environment equipped with real-world defensive technologies, including Anti-Virus, Web Proxies, EDR, SIEM integration, and other detection mechanisms.
Participants will engage in guided step-by-step exercises to safely emulate real-world threat actors and assess the effectiveness of common security controls. The workshop covers key areas such as gathering actionable cyber threat intelligence, planning and executing adversary emulation engagements, and using a variety of emulation tools and frameworks. Attendees will also learn how to map techniques to the MITRE ATT&CK framework, conduct threat hunting activities, and design custom adversary emulation plans tailored to organizational needs.
By the end of the workshop, attendees will be equipped with the practical skills needed to operationalize threat emulation efforts and strengthen their organization’s cyber defense posture.
\

Training Ground
Boardroom